Kernel Programming Gcc Gnu Make Gnu Binutils Autoconf Subversion Cvs X86 Assembly X86 Architecture C Lua Uclibc Busybox Common Criteria Bios Mmu Gtk+ Mls Security Unix Shell Scripting Linux Computer Security Software Engineering Integration X86 Software Development Security Rpm Agile Methodologies Shell Scripting C++ Unix
Michael W. Focke - Oakton VA, US James E. Knoke - Vienna VA, US Paul A. Barbieri - Ashburn VA, US Robert D. Wherley - Middletown MD, US John G. Ata - Sterling VA, US Dwight B. Engen - Herndon VA, US
Assignee:
BAE Systems Information Technology Inc. - McLean VA
International Classification:
G06F 11/00
US Classification:
726 22, 713166, 703 21, 703 22
Abstract:
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e. g. , classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Michael W. Focke - Oakton VA, US James E. Knoke - Vienna VA, US Paul A. Barbieri - Ashburn VA, US Robert D. Wherley - Middletown MD, US John G. Ata - Sterling VA, US Dwight B. Engen - Herndon VA, US
Assignee:
BAE Systems Enterprise Systems Incorporated - McLean VA
International Classification:
H04L 9/00
US Classification:
726 1, 713164, 726 22
Abstract:
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e. g. , classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Data Security Verification For Data Transfers Between Security Levels In Trusted Operating System
Michael W. Focke - Oakton VA, US James E. Knoke - Vienna VA, US Paul A. Barbieri - Ashburn VA, US Robert D. Wherley - Middletown MD, US John G. Ata - Sterling VA, US Dwight B. Engen - Herndon VA, US
Assignee:
BAE Systems Information Technology Inc. - McLean VA
International Classification:
H04L 29/06
US Classification:
726 1, 726 22
Abstract:
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e. g. , classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Access Control Differentiation In Trusted Computer System
Michael W. Focke - Oakton VA, US James E. Knoke - Vienna VA, US Paul A. Barbieri - Ashburn VA, US Robert D. Wherley - Middletown MD, US John G. Ata - Sterling VA, US Dwight B. Engen - Herndon VA, US
International Classification:
G06F 11/00
US Classification:
726 22
Abstract:
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e. g. , classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Multi-Domain Architecture For Process Isolation With Processor Supporting Multi-Domain Architecture
Michael W. Focke - Oakton VA, US James E. Knoke - Vienna VA, US Paul A. Barbieri - Ashburn VA, US Robert D. Wherley - Middletown MD, US John G. Ata - Sterling VA, US Dwight B. Engen - Herndon VA, US
Assignee:
BAE Systems Information Solutions, Inc. - Reston VA
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e. g. , classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Michel Focke - Oakton VA, US James Knoke - Vienna VA, US Paul Barbieri - Ashburn VA, US Robert Wherley - Middletown MD, US John Ata - Sterling VA, US Dwight Engen - Herndon VA, US
Assignee:
DigitalNet Government Solutions, LLC - Herndon VA
International Classification:
H04L009/00
US Classification:
713/164000
Abstract:
A trusted computer system that offers Linux compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Process Isolation By Limiting Covert Storage Channels In Trusted Operating System
Michael Focke - Oakton VA, US James Knoke - Vienna VA, US Paul Barbieri - Ashburn VA, US Robert Wherley - Middletown MD, US John Ata - Sterling VA, US Dwight Engen - Herndon VA, US
Assignee:
BAE Systems Information Technology LLC - Herndon VA
International Classification:
G06F 12/14
US Classification:
726022000
Abstract:
A trusted computer system that offers Linux(g compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modem development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
Youtube
Les Engen - A Party in Heaven
Tribute to the life of Les Engen. A servant of God, father of seven an...